Their Own Devices

DMG Operations

Each operation is given a code name, with a specific naming regime in place to reflect the key objectives and specifics of the operation.

The DMG Operation Naming Protocols break down into three component parts – an Activity type, an Objective type, and a Location.

Activity types are based on the suspect pool for the detected POWER breaching activity.
Each operation will have a word that is a bug, an animal, or a flower based on the suspected targets.

Activities relating to a suspected single technomancer have a bug name.

Activities relating to a group of technomancers working together have an animal name.

Activities relating to rogue technomantic devices without an active controller get a flower name.

Objective types are based on the desired outcome of the mission. Each operation will have a word that is either a colour, a metal, a type of measurement, or a weather related term.

Missions to retrieve items and capture targets get a colour name.

Missions to eliminate targets and retrieve or destroy items get a metal name.

Missions to observe get a measurement name.

Missions to rescue hostages get a weather name.

Locations are based on which DMG Operations Squadron group is responsible for the territory that the mission takes place in. The first two letters of the first word of the codename will relate to the Location.

November 2009 : Operation MERCURYYELLOWHORSE – to retaliate against terrorist hackers who attacked Fort Halstead, and eliminate a threat to global security in the form of a massive leak of information regarding DMG operations.